Browsing tag

Cryptocurrency mining

StripedFly Malware Operated Unnoticed for 5 Years, Infecting 1 Million Devices

An advanced strain of malware masquerading as a cryptocurrency miner has managed to fly the radar for over five years, infecting no less than one million devices around the world in the process. That’s according to findings from Kaspersky, which has codenamed the threat StripedFly, describing it as an “intricate modular framework that supports both […]

DarkGate Malware Spreading via Messaging Services Posing as PDF Files

A piece of malware known as DarkGate has been observed being spread via instant messaging platforms such as Skype and Microsoft Teams. In these attacks, the messaging apps are used to deliver a Visual Basic for Applications (VBA) loader script that masquerades as a PDF document, which, when opened, triggers the download and execution of […]

Ransomware Hackers and Scammers Utilizing Cloud Mining to Launder Cryptocurrency

Ransomware actors and cryptocurrency scammers have joined nation-state actors in abusing cloud mining services to launder digital assets, new findings reveal. “Cryptocurrency mining is a crucial part of our industry, but it also holds special appeal to bad actors, as it provides a means to acquire money with a totally clean on-chain original source,” blockchain […]

8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency

The notorious cryptojacking group tracked as 8220 Gang has been spotted weaponizing a six-year-old security flaw in Oracle WebLogic servers to ensnare vulnerable instances into a botnet and distribute cryptocurrency mining malware. The flaw in question is CVE-2017-3506 (CVSS score: 7.4), which, when successfully exploited, could allow an unauthenticated attacker to execute arbitrary commands remotely. […]

Researchers ‘Accidentally’ Crash KmsdBot Cryptocurrency Mining Botnet Network

An ongoing analysis into an up-and-coming cryptocurrency mining botnet known as KmsdBot has led to it being accidentally taken down. KmsdBot, as christened by the Akamai Security Intelligence Response Team (SIRT), came to light mid-November 2022 for its ability to brute-force systems with weak SSH credentials. The botnet strikes both Windows and Linux devices spanning […]

Watch Out! Cryptocurrency Miners Targeting Dockers, AWS and Alibaba Cloud

LemonDuck, a cross-platform cryptocurrency mining botnet, is targeting Docker to mine cryptocurrency on Linux systems as part of an active malware campaign. “It runs an anonymous mining operation by the use of proxy pools, which hide the wallet addresses,” CrowdStrike said in a new report. “It evades detection by targeting Alibaba Cloud’s monitoring service and […]

This New Linux Malware Mines Crypto By Creating Malign Linux Modules

Cybersecurity research firm TrendMicro has come across a new Linux malware. The malware — Skidmap — is capable of illicit cryptocurrency mining activities. Skidmap is the new Linux malware in town As per the research, the new Linux malware mines crypto by creating malicious loadable kernel modules (LKM) to stay under the wraps. As the […]

This Woman Hacked Capital One Servers To Mine Cryptocurrency

A couple of months back, ex-Amazon employee Paige Thompson was accused of gaining unauthorized access to the cloud servers of the US-based bank Capital One and 30 other entities. Thompson, who is currently in custody, was indicted on Wednesday and charged with Wire Fraud, Computer Fraud and Abuse. She will be presented in front of […]

Avast And French Cops Save 850,000 PCs From Retadup Crypto Malware

Avast has managed to take down the Retadup crypto-mining worm disinfecting more than 850,000 computers, with the help of French National Gendarmerie, the antivirus maker announced in a blog post. The security researchers at Avast discovered a design flaw in the communications protocol of Retadup that allowed the team to remove the malware from the […]

Ukranian Employees Connect Nuclear Plant To Internet To Mine Cryptocurrency

It is a well-known fact that mining cryptocurrency requires heavy computing power and there is no better place than a nuclear power plant with all the required resources. In a surprising incident, employees of Ukranian nuclear plant connected the internal part of the plant to the internet for mining cryptocurrency. The incident happened in July […]

What Is Cryptocurrency Mining?

Cryptocurrency mining is a process in which transactions between users are checked and added to the open book of the blockchain. The extraction process is also responsible for introducing new coins into the existing negotiable offer and is one of the key elements that allow cryptocurrencies to function as a decentralized peer-to-peer network, without the […]

Compromised Docker Hosts Use Shodan for Cryptocurrency Mining

Researchers have detected a campaign in which compromised docker hosts use Shodan for carrying out cryptocurrency mining. Hackers scan for Docker hosts with exposed APIs and use them for cryptocurrency mining, which is done by deploying malicious self-propagating Docker images that are infected with Monero miners and scripts which use Shodan for finding vulnerable targets. […]

Miner Malware Uses Multiple Propagation Methods to Infect Windows Machines and to Drop Monero Miner

A miner malware that uses a number of techniques that includes EternalBlue, Powershell abuse, pass-the-hash technique, Windows admin tools, and brute force to infect windows machine and to drop a Monero miner. According to Trend Micro telemetry, the threat actors behind the campaign expands botnet to other countries that include Australia, Taiwan, Vietnam, Hong Kong, […]

China Could Soon Ban Cryptocurrency Mining Citing Wastage of Resources

The Chinese government is soon expected to ban all cryptocurrency mining activities in the country. It is suggested that the National Development and Reform Commission (NDRC) in China is considering the ban and is asking for public opinions on the revision of the Guiding Catalogue for the Adjustment of Industrial Structure. For the unacquainted, the […]

Ethereum Planning To Cut Its Energy Consumption by 99%

Ethereum is the second biggest cryptocurrency with a massive $10 billion market capitalization. It also means that Ethereum mining and transactions gobble up tons of energy. Well, things might change by the end of 2019. According to a report from IEEE Spectrum, Vitalik Buterin, the computer scientist who invented Ethereum, is planning a major overhaul. Buterin is […]

These are worst cyberthreats of 2018

Cybersecurity specialists from the International Institute of Cyber Security already predicted that this would be a difficult year for users and organizations, even 2018 began with the discovery of CPU processor vulnerability present in virtually any developed chip over the last 20 years. The worst part is that things didn’t get any better; new malware […]

Cryptocurrency mining, a well-known practice at The Pirate Bay

  More than a security breach, the Pirate Bay has made the virtual currency mining a source for advertising. The Pirate Bay has begun to notify its users that by entering the website they will be granting permission for their CPU to be used to mine virtual assets, all this after the page was again caught […]

Cryptocurrency-Mining Botnet Attack SSH Service Running IoT Devices

Newly discovered cryptocurrency mining bot targeting the Internet of Things (IoT) devices which contain SSH service and  IoT-related ports, including 22, 2222, and 502. Cryptocurrency-mining malware consumes the system resources and utilizes them for mining cryptocurrencies without user permissions. This crypto-mining attack will work for all the connected devices and servers that running under SSH […]

7 Easy Ways To Block Cryptocurrency Mining In Your Web Browser

Cryptocurrencies are digital or virtual currencies that make use of encryption for security. As they are anonymous and decentralized in nature, one can use them for making payments that can’t be tracked by governments. As crypto-mining has gained popularity, the website owners are now using cryptocurrency mining scripts to use the CPU power of the […]